Home Featured

Featured

Featured posts

Robotic Vacuums May Hoover Your Data

Researchers have discovered a pair of vulnerabilities that allow unauthorized code execution in a robotic vacuum.A robot vacuum cleaner sure makes cleaning floors easier, but it may also ease the...

Malwarebytes report on Top Cybercrime Tactics and Techniques

Malwarebytes published reports on Cybercrime tactics and techniques shows the new developments in ransomware and cryptomining attacks. When compared to Q1 the Q2 attacks showed more sophistication. Introduction of complex VPNFilter...

Automated money-laundering scheme found in free-to-play games – Naked Security

Lisa Vaas Lisa has been writing about technology, careers, science and health since 1995. She rose to the lofty heights of Executive Editor for eWEEK, popped out with...

10 Magento Features: Enhancing the E-commerce experience

Magento is an excellent platform that is favored by the modern entrepreneurs in today’s digital market. The high-quality images, secure...

Stealthy Malware Hidden in Images Takes to GoogleUserContent | The first stop for security...

The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy...

Newly added security tests, June 28, 2017: vBulletin CVE-2015-7808

To bring you the most up-to-date security service and help you stay on top of threats, we update Detectify on a regular basis. Here are some of the latest security...

Cyberattacks in Finland Surge During Trump-Putin Summit

Attackers targeted IoT devices like they did during Trump's June meeting with North Korea's Kim Jong-un, but this time China was the top-attacking nation.President Donald Trump's recent meeting with Russian...

Security Information and Event Management(SIEM)

Logs are fetched to the SIEM in two different ways. Agent-based & Non-Agent based. In agent-based approach, a log pushing agent in installed in the client machine from which the...

Microsoft Bounty Program Offers Payouts for Identity Service Bugs

A high-quality multi-factor authentication bypass submission can win a bounty hunter up to $100,000. Source link

Online generators… of dashed expectations

Quite recently, we (and hence our security solutions) started to designate an entire class of sites — gift card generators — as fraudulent, despite their not stealing any money or personal data...

APLICATIONS

Monday review – the hot 22 stories of the week –...

Naked Security writer You can follow Naked Security on Twitter at <a href="http://twitter.com/NakedSecurity">@NakedSecurity</a>, on <a href="https://www.facebook.com/SophosSecurity">Facebook</a> or join us on <a...

HOT NEWS